Category: Cybersecurity Insiders

ProArch Acquires Data Protection Firm Trum & Associates

ATLANTA–(BUSINESS WIRE)–ProArch, a global IT consulting and services organization, announced the acquisition of Trum & Associates (Trum), a data protection company with a deep understanding of regulatory compliance headquartered in Destin, Florida. The acquisition expands ProArch’s cybersecurity and governance, risk,…

IT/OT convergence and Cybersecurity best practices

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Most of the time, the advantages of technology…

(ISC)² Top-Ranked Webinars of 2022 by Region

From fighting the ever-present ransomware threat to securing cloud infrastructures to honing identity management practices, the past year’s showcase of (ISC)² webinar topics was wide-ranging and thought-provoking. A cursory look at the topics we tackled throughout 2022 provides a reflection of…

Cyber Attack news headlines trending on Google

First, is the news that the Indian government has launched its own Mobile Operating systems that have capabilities to take on international rivals like iOS and Android. Within the next few weeks, the government of the sub-continent is preparing to…

How to handle personal data of students

School districts are constantly being targeted by cyber attacks, leading to data breaches and information misuse. So, to those who are worried about the privacy of student info, here are some tips to protect it from prying eyes. 1.) Categorization…

Seasons Greetings from (ISC)2

Dear (ISC)² Members, Associates and Candidates:  I hope this message finds you well. As 2022 comes to an end, I am grateful for the opportunity to reflect on the past year and all we have achieved together.   Launching an entry-level certification…

Beyond Identity Receives FIDO2 Certification

NEW YORK–(BUSINESS WIRE)–Beyond Identity, the leading provider of passwordless, phishing-resistant MFA, announced today that it has received FIDO2 certification. The company’s advanced authentication platform dramatically simplifies enterprise adoption of standards-based passwordless authentication and phishing-resistant MFA. Beyond Identity extends FIDO2 with…

LATEST CYBERTHREATS AND ADVISORIES – JANUARY 13, 2023

Cybercriminals attack schools, the FCC looks to change data breach rules and artificial intelligence alters the cybersecurity landscape. Here are the latest threats and advisories for the week of January 13, 2023. Threat Advisories and Alerts How Businesses Can Securely…

McNally Capital Announces Investment in Xcelerate Solutions

CHICAGO–(BUSINESS WIRE)–McNally Capital (“McNally”), a lower middle-market private equity firm focused on founder and family-owned businesses, is pleased to announce an investment in Xcelerate Solutions (“Xcelerate”). Xcelerate is a leading defense and national security company, providing integrated solutions delivered through…

CTN Solutions Appoints New Advisory Board

BLUE BELL, Pa.–(BUSINESS WIRE)–CTN Solutions has appointed a new advisory board to provide support and guidance to our CEO Drew Morrisroe as our company continues to execute on our growth strategy. Drew Morrisroe, President & CEO, stated, “A key factor…

Microsoft introduces voice copying AI tool

Microsoft, the technology giant of America, has achieved a new milestone in Artificial Intelligence by introducing a voice mimicking AI tool dubbed ‘Vall-E’. The tool has enough potential to copy a voice within 3 seconds and can easily create an…

CISSP-ISSAPs – We Need Your Input

With more than 150,000 CISSPs around the world, some of you have asked – what's the next step? For many of you, that next step is one of the CISSP concentrations focused on security architecture, engineering or management. The CISSP-ISSAP…

Cuba Ransomware gang hacking Microsoft Exchange Servers

Microsoft issued a press update that Cuba Ransomware gang were after its exchange servers after exploiting critical server-side request forgery (SSRF) vulnerability. Incidentally, the same flaw is also being exploited by ‘Play’ Ransomware group that hacked into the cloud servers…

Wallarm adds Cybersecurity Leaders to its Board of Advisors

SAN FRANCISCO–(BUSINESS WIRE)–Wallarm, the end-to-end API security company, is pleased to introduce the newest cybersecurity luminaries to join the company’s already impressive Board of Advisors. Each new member brings broad and in-depth cybersecurity and business expertise, and are eager to…

IW’s GRAYPATH, Next-Gen VPN Solution, Aligned with US Army’s Plans to Offset Contested Communications with Multipath Transport Agnostic Capabilities, Awarded Prime Contract from Defense Agency

RESTON, Va.–(BUSINESS WIRE)–Intelligent Waves (IW), a leading IT integrator that delivers mission-focused multi-domain operational expertise and innovation to the Government through high-impact technology solutions, announced today that GRAYPATH, its flagship Next-Gen VPN solution, has been awarded a prime contract with…

Help Shape the CGRC Exam – Formerly Known As CAP

As practitioners know all too well, it is paramount to remain up to date with the changing landscape of cybersecurity. We regularly conduct Job Task Analysis (JTA) studies to review exam content and outlines to ensure the accuracy, relevance and…

Latest Cyberthreats and Advisories – December 23, 2022

Ransomware hits hard around the world – again, Cybercriminals steal food and Fortnite’s developer is fined millions. Here are the latest threats and advisories for the week of December 23, 2022.  Threat Advisories and Alerts  Criminal Actors Use BEC Attacks…

Are WE the firewall?

As we start a new year, let's think about how we can draw up a plan to exercise our cyber fitness and make it a culture that sticks. It's a critical time to get this done as we work toward…

NTT Joins U.S. Government Public-Private Cybersecurity Initiative JCDC

TOKYO–(BUSINESS WIRE)–NTT Corporation (NTT) is pleased to announce its membership in the Joint Cyber Defense Collaborative (JCDC) to further strengthen the U.S. government focus on cybersecurity and boost resilience internationally. Established by the U.S. Cybersecurity and Infrastructure Security Agency (CISA)…

CrowdStrike Named to Glassdoor’s Best Places to Work in 2023 List

AUSTIN, Texas–(BUSINESS WIRE)–CrowdStrike (Nasdaq: CRWD), a leader in cloud-delivered protection of endpoints, cloud workloads, identity and data, today announced it has been honored with a Glassdoor Employees’ Choice Award, which recognizes the Best Places to Work in 2023. CrowdStrike landed…

Conceal Partners with Thousand Guards to Expand into MSSP Markets

AUGUSTA, Ga.–(BUSINESS WIRE)–Conceal, the leader in protecting against web-based attacks, today announced it is expanding into the Spain, France, Italy, and Portugal MSSP markets through a strategic partnership with Thousand Guards, a Southern European based consulting firm whose mission is…

(ISC)² Top-Ranked Webinars of 2022 by Region

From fighting the ever-present ransomware threat to securing cloud infrastructures to honing identity management practices, the past year’s showcase of (ISC)² webinar topics was wide-ranging and thought-provoking. A cursory look at the topics we tackled throughout 2022 provides a reflection of…

Microsoft to invest $10 billion in Open AI ChatGPT

Open AI developed ChatGPT writing app is trending on Google as headlines for the past few days and to capitalize on its craze, the American Technology giant Microsoft offered an acquisition deal worth $60 billion that eventually did not materialize…

What is Hyper Data Collection

As digitalization is increasing with time, information generation, sharing and storage has also hit its peak. As new types of data are being generated, innovative dangers in protecting such info are also emerging with time. Businesses are ready to take…

Hyve Solutions Leveraging 4th Gen Intel Xeon Scalable Processors

FREMONT, Calif.–(BUSINESS WIRE)–Hyve Solutions Corporation, a wholly owned subsidiary of TD SYNNEX Corporation (NYSE: SNX) and a leading provider of hyperscale digital infrastructures, today announced it is leveraging 4th Gen Intel Xeon Scalable processors across Hyve-designed motherboards and systems. “Our…

The dos and don’ts of ransomware negotiations

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Has your organization suddenly been attacked by a…

XM Cyber’s Cybersecurity Predictions for 2023

The discussion of cyber security has grown beyond the IT department and now includes the entire C-suite as well as the Board. As the number of attacks has increased and the stakes grow regarding penalties and reputation, it has become…

Seasons Greetings from (ISC)2

Dear (ISC)² Members, Associates and Candidates:  I hope this message finds you well. As 2022 comes to an end, I am grateful for the opportunity to reflect on the past year and all we have achieved together.   Launching an entry-level certification…

What is SASE

Secured Access Service Edge (SASE) is an evolving cloud-focused architecture that was released by Gartner in 2019. SASE is designed to solve the problem of network performance and limited security visibility for distributed corporate business systems (infrastructure, platforms, and applications)…

Men are more hit by Identity Thefts than Women

While the entire world is speaking about gender equality in every work-field, we observe things to be going contrarily in the world of cyber security. According to a research, Men are twice as likely to be targeted by Identity Theft…

CISSP-ISSAPs – We Need Your Input

With more than 150,000 CISSPs around the world, some of you have asked – what's the next step? For many of you, that next step is one of the CISSP concentrations focused on security architecture, engineering or management. The CISSP-ISSAP…

Forging the Path to Continuous Audit Readiness

By Scott Gordon, CISSP, Oomnitza  Technology oversight is a common mandate across IT and security frameworks and compliance specifications, but achieving that oversight is difficult. The rise of hybrid workplaces, shadow IT/DevOps, and cloud infrastructure dynamics continue to create cybersecurity…

HKW Acquires CMIT Solutions and HTW

INDIANAPOLIS–(BUSINESS WIRE)–HKW, a middle-market private equity firm focused on growth companies, has acquired CMIT Solutions LLC (“CMIT”), a leading IT Managed Service Provider (MSP) franchisor, and HTW, Inc. (“HTW”), CMIT’s largest franchisee. As a rapidly growing IT and cybersecurity organization,…

WhatsApp Proxy Servers Connect details

WhatsApp, the messaging platform now owned by Facebook parent Meta, has made it official that its users will now-on be allowed to connect their accounts to proxy servers. However, the new rule only applies to nations where censorship is high,…